Sciweavers

1580 search results - page 242 / 316
» Modules for Crosscutting Models
Sort
View
INDOCRYPT
2004
Springer
14 years 1 months ago
The Security and Performance of the Galois/Counter Mode (GCM) of Operation
Abstract. The recently introduced Galois/Counter Mode (GCM) of operation for block ciphers provides both encryption and message authentication, using universal hashing based on mul...
David A. McGrew, John Viega
IWPC
2003
IEEE
14 years 1 months ago
Design Recovery of a Two Level System
Many applications have one or more important modules that are written in a language other than conventional procedural or object oriented languages. These languages are often tran...
Thomas R. Dean, Yuling Chen
KBSE
2002
IEEE
14 years 1 months ago
Generating Product-Lines of Product-Families
GenVoca is a methodology and technology for generating product-lines, i.e. building variants of a program. The primitive components from which applications are constructed are ref...
Don S. Batory, Roberto E. Lopez-Herrejon, Jean-Phi...
GECCO
2010
Springer
152views Optimization» more  GECCO 2010»
14 years 1 months ago
Importing the computational neuroscience toolbox into neuro-evolution-application to basal ganglia
Neuro-evolution and computational neuroscience are two scientific domains that produce surprisingly different artificial neural networks. Inspired by the “toolbox” used by ...
Jean-Baptiste Mouret, Stéphane Doncieux, Be...
MM
1999
ACM
120views Multimedia» more  MM 1999»
14 years 20 days ago
An RTP-based synchronized hypermedia live lecture system for distance education
In this article, we have introduced a “Live Synchronized Hypermedia Live Lecture (SHLL) System” using RTP to synchronize the live presentation of streaming video lecture, HTML...
Herng-Yow Chen, Yen-Tsung Chia, Gin-Yi Chen, Jen-S...